• Aucun résultat trouvé

A Multi-Replica Decoding Technique for Contention Resolution Diversity Slotted Aloha

N/A
N/A
Protected

Academic year: 2021

Partager "A Multi-Replica Decoding Technique for Contention Resolution Diversity Slotted Aloha"

Copied!
7
0
0

Texte intégral

(1)

HAL Id: hal-01466629

https://hal.archives-ouvertes.fr/hal-01466629

Submitted on 13 Feb 2017

HAL is a multi-disciplinary open access

archive for the deposit and dissemination of

sci-entific research documents, whether they are

pub-lished or not. The documents may come from

teaching and research institutions in France or

abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire HAL, est

destinée au dépôt et à la diffusion de documents

scientifiques de niveau recherche, publiés ou non,

émanant des établissements d’enseignement et de

recherche français ou étrangers, des laboratoires

publics ou privés.

A Multi-Replica Decoding Technique for Contention

Resolution Diversity Slotted Aloha

Huyen Chi Bui, Karine Zidane, Jérôme Lacan, Marie-Laure Boucheret

To cite this version:

Huyen Chi Bui, Karine Zidane, Jérôme Lacan, Marie-Laure Boucheret. A Multi-Replica Decoding

Technique for Contention Resolution Diversity Slotted Aloha. 82nd IEEE Vehicular Technology

Con-ference (VTC Fall 2015), Sep 2015, Boston, United States. pp. 1-5. �hal-01466629�

(2)

O

pen

A

rchive

T

OULOUSE

A

rchive

O

uverte (

OATAO

)

OATAO is an open access repository that collects the work of Toulouse researchers and

makes it freely available over the web where possible.

This is an author-deposited version published in :

http://oatao.univ-toulouse.fr/

Eprints ID : 17185

The contribution was presented at VTC Fall 2015 :

http://www.ieeevtc.org/vtc2015fall/

To cite this version :

Bui, Huyen Chi and Zidane, Karine and Lacan, Jérôme and

Boucheret, Marie-Laure A Multi-Replica Decoding Technique for Contention

Resolution Diversity Slotted Aloha. (2016) In: 82nd IEEE Vehicular Technology

Conference (VTC Fall 2015), 6 September 2015 - 9 September 2015 (Boston,

United States).

Any correspondence concerning this service should be sent to the repository

administrator:

staff-oatao@listes-diff.inp-toulouse.fr

(3)

A Multi-Replica Decoding Technique for Contention

Resolution Diversity Slotted Aloha

Huyen-Chi Bui

,Karine Zidane

, J´erˆome Lacan

,Marie-Laure Boucheret

Email: b.huyenchi@gmail.comUniversity of Toulouse, ISAE/DMIA & T´eSA

Email:{karine.zidane, jerome.lacan}@isae.fr

University of Toulouse, IRIT/ENSEEIHT

Email: marie-laure.boucheret@enseeiht.fr

Abstract—This paper proposes a new method for data

recep-tion over a random access channel in a satellite communicarecep-tion system. The method is called Multi-replicA decoding using corRelation baSed locALisAtion (MARSALA). It uses the same transmission scheme as in Contention Resolution Diversity Slotted Aloha (CRDSA) where each user sends several replicas of the same packet over the frame. MARSALA is a new decoding technique that localises all the replicas of a packet using a correlation based method, then combines them to decode the data. With MARSALA, the system can achieve a normalized throughput higher than 1.2, resulting in a significant gain

com-pared to CRDSA, while adding a relatively low implementation complexity at the receiver. We also highlight on the practical issues related to channel estimation and how to perform coherent signal combination in MARSALA.

I. INTRODUCTION

Recent random access (RA) methods used in satellite communications have the potential to enhance ressource usage and reduce communication delays over a satellite return link. However, a main challenge of RA protocols is to deal with superimposed signals arriving simultaneously at the receiver. In fact, the information loss due to signals collision is the principal cause of throughput decrease in any wireless com-munication. To handle this problem, recent RA methods use Physical Layer Network Coding (PNC) [1] and Successive Interference Cancellation (SIC).

Among these methods we cite Contention Resolution Di-versity Slotted Aloha (CRDSA) [2]. CRDSA has been pro-posed by the European Space Agency (ESA) and has been adopted by the DVB-RCS2 standard [3]. In CRDSA, each user sends two replicas of the same packet on random time slots on the frame. Each replica contains signalisation information used to localise its copy. If all the users have transmitted packets with equal power, only collision-free replicas can be decoded successfully at the receiver. Once decoded, both replicas are localised and removed from the frame. This operation is called interference cancellation. Thus, the receiver can recover other packets that have been in collision. This process is repeated iteratively each time that a replica is decoded successfully. In the case of equi-powered packets, CRDSA permits to achieve a higher normalized throughput1 (T

max ≃ 0.55) than the

Diversity Slotted Aloha (DSA) [4] protocol in which the interference cancellation is not implemented (Tmax≃ 0.36).

1The ratio of the number of successful transmissions over the number of

time slots on a frame (without including the replicas).

Another variant of CRDSA, is CRDSA++ [5], where the same concept is extended to more than two replicas per packet (from 3 to 5 replicas). With equi-powered packets, and a Forward Error Correction (FEC) code of rate 1/2, the maximum throughput is obtained with CRDSA-3 (3 replicas per packet) and it is equal to 0.7. When each user transmits an irregular number of replicas on the same frame, the method is called Irregular Repetition Slotted Aloha (IRSA) [6]. If the distribution of the number of replicas is optimal, the maximum normalized throughput obtained with IRSA can reach 0.8.

Coded Slotted Aloha (CSA) [7] has been introduced later. In this method, packet segmentation and erasure coding are used in addition to PNC and SIC, but the maximum throughput achieved is equal to 0.8 which is similar to IRSA. More recently, Multi-Slot Coded Aloha (MuSCA) [8] has been proposed to further boost the maximum achievable throughput. In MuSCA, each packet is encoded with a strong FEC code of rateR. Then the code word is divided into several fragments, and a coded localisation field is added to each fragment. The decoding entity first decodes the signalisation headers then locates all the fragments on the frame. It reassembles the fragments corresponding to one code word and attempts to decode it even if the fragments are in collision. MuSCA is able to achieve a normalized throughput greater than1.29.

The weakness in IRSA and CSA is limited throughput. MuSCA suffers from complex implementation cost. MuSCA in particular requires significant modifications to DVB-RCS2. In this paper, we introduce Multi-replicA decoding us-ing corRelation baSed locALisAtion (MARSALA) as a new method enabling to increase the throughput compared to CRDSA, IRSA and CSA. With MARSALA, we can decode a packet by combining all its replicas without any additionnal coding needed. MARSALA does not result in any system modifications on the CRDSA transmitter side. The only im-plementation complexity added is at the receiver side, and it is mainly induced by the channel estimation and the correlation based localisation. Moreover, MARSALA respects the DVB-RCS2 standard. The main contributions of our work can be summarized as follows:

• We explain precisely how packet replicas can be

localised on the frame using a simple correlation based technique;

(4)

Fig. 1: System model

decoded even when they are in collision with packets sent by other users;

• We highlight on the channel estimation operations that should be done in order to ensure a good performance of MARSALA;

• We evaluate the normalized throughput achieved with MARSALA (i.e. the probability of successful packet transmission per time slot) and we compare it to CRDSA, in the case of equi-powered packets.

II. SYSTEMOVERVIEW

Fig.1 shows the system model. We consider the uplink of a wireless communication system shared between Nu users.

Each user transmits Nb copies of the same packet to a

destination node (a satellite or a gateway) within the duration of one frame (TF). The frame is divided intoNstime slots. To

continue to send other messages, the user must wait until the beginning of the next frame. We assume that all nodes (users and destination) operate in half duplex mode. We suppose that there is no direct link between the users. The transmission is subjected to Additive White Gaussian Noise (AWGN).

Each packet contains K bits of information. The packets are encoded with a CCSDS (Consultative Committee for Space Data Systems [9]) turbo code of rateR, wich results in a code word of length K/R bits. The code word is then modulated with a modulation of order M . The payload length obtained is equal to K/(R.log2(M )) symbols. Similar to CRDSA, a preamble and a postamble are added at the beginning and the end of each packet, and pilot blocks are distributed inside the packet for the purpose of channel estimation. The total packet length after modulation and coding is equal to L symbols. Before the transmission, the symbols corresponding to each packet enter a shaping filter with a square root raised cosine function, with an oversampling rate Q.

We suppose that the receiver memorizesNstime slots, then

lauches the CRDSA decoding process. Once CRDSA comes to a deadlock and no packet can be decoded, the receiver proceeds with MARSALA.

III. MULTI-REPLICADECODINGUSINGCORRELATION

BASEDLOCALISATION

The proposed localisation and decoding scheme for MARSALA operates as follows:

1) Localisation ofNb replicas corresponding to a same

packet;

2) For each set ofNb localised replicas:

 



Fig. 2: Example ofx(t) and y(t) on a frame of 5 slots

• Estimation and correction of the following

parameters: timing offsets, clock drifts, fre-quency and phase offsets, signal amplitude; • Combination of theNbreplicas with corrected

parameters;

• Decoding of the packet.

3) Interference cancellation.

4) Come back to (1).

A. Replicas Localisation

The localisation entity at the receiver allows to localise all replicas corresponding to a same packet on the received frame. This operation is based on signal correlation. First, the receiver identifies a time slot containing interfered packets and refers to it byT Sk, wherek is an integer index (k ∈ [1, Ns]). It uses

the signal received within this slot as a reference signal noted byx(t), with t =h(k − 1)T, (k − 1)T +T

Q, ..., kT

i

, denoting the time vector, andT being the duration of one time slot. In other words,x(t) is the sum of all signals transmitted on T Sk.

Then, the receiver computes the correlation betweenx(t) and the signal received on the rest of the frame, noted by y(t). An example of x(t) and y(t) is given in Fig.2, where k = 2, i.e. x(t) is the signal received on the second time slot. The correlation result presents a number of correlation peaks which depends on the number of users that have transmitted a replica onT Sk. A correlation between signals on two slots

is considered as a peak if the correlation amplitude is above a defined threshold. Finally, the correlation peaks are used to identify all time slotsT Sm,(m ∈ [1, Ns]; m 6= k), that contain

at least a packet replica of one of the packets transmitted on T Sk.

This step constitutes the main difference between

MARSALA and the different versions of CRDSA. MARSALA facilitates localization of replicas without having to decode the signalling information. In other words, the correlation peaks detected are used to identify the time slots containing the replicas of the same packet.

B. Channel parameters estimation and adjustment

In real transmission conditions, the replicas sent by the same user experience different channel impairments because they are sent on different time slots of the frame. In this paper, we suppose that the varying channel parameters for one user from one time slot i to another are the clock drift ∆τi and

(5)

the frequency offset∆f remain constant for one user over the duration of a frame.

Once the receiver localises the replicas of a packet on the frame, it performs signal summation (Section III-C). But, in order to ensure a coherent signal summation, the receiver has to compensate the channel impact on the corresponding signal on each time slot.

First, the receiver estimates the channel parameters relative to the localised packet replicas, that vary from one time slot to another. The receiver computes∆τi and obtains the optimal

sampling time for the localised replica on time sloti. To realize this operation, a classical algorithm for timing recovery like the algorithm of Oerder and Meyr [10] can be applied.

After the clock drift computation, the receiver estimates the phase offset φi. A phase estimator like the Viterbi estimator

[11] can be used. Once the estimation is done, it corrects the phase of each replica before the summation.

At the end of these operations, we obtain Nb signals

corresponding to the replicas of the same packet, which are coherent in terms of timing and phase. Thus, the receiver can proceed with signal combination as explained in the following subsection.

C. Signal Combination

At the output of the channel estimation and adjustment entity, we obtain Nb coherent signals corresponding to Nb

replicas of the same user. Each signal is interfered by different users. The receiver performs the combination of these Nb

signals. The powerPeq of the obtained signal is

Peq = P (s1+s2+...+sNb)+P (I1+I2+...+INb)+ Nb X i=1 N0, (1) where s1, s2, ..., sNb each denotes the signal relative to the

replica of a same packet after phase and timing correction, I1, I2, ..., INb represent the interference signals on the

com-bined time slots and N0 is the power spectral density of

AWGN. Given that the signalss1, s2, ..., sNb contain the same

information and are coherent in phase and timing, while interference and noise are incoherent, we can write

Peq=P (Nbs1) + Nb X i=1 P (Ii) + Nb X i=1 N0, =Nb2P (s1) + Nb X i=1 P (Ii) + NbN0. (2)

The goal is to obtain an equivalent Signal to Noise plus Interference Ratio (SNIR) for a localised set of Nb replicas

after signal combination, higher than the SNIR for one inter-fered replica without signal combination. Once the signals are combined, the rest of the channel parameters are estimated (A and∆f ), and the receiver attempts to demodulate and decode the useful signal. If the last step is successful, the receiver performs interference cancellation, and removes the decoded packet from the corresponding time slots on the frame.

                               

Fig. 3: A frame with 2 clean packets, Ns= 8 slots, Nu = 8

users, andNb = 3 replicas per user

                         

Fig. 4: The frame after cancellation of clean replicas

-400 -200 0 200 400 600 800 1000 1 2 3 4 5 6 7 8 Correlation Amplitude

Time Slot Number

Fig. 5: Correlation of the signal received onT S1and the rest

of the frame

IV. NUMERICALEXAMPLE

Fig.3 illustrates an example of a received frame, where Ns = 8 time slots, Nu = 8 users and Nb = 3 replicas per

packet. The modcod used is QPSK1/2 and all the packets are transmitted with equal power. The received packets are affected by random phase and frequency offsets. For each user, the phase offsetφ has a value between 0 and 2π and it is supposed to change randomly from one slot to another. The frequency offset ∆f is different for each user but it is considered to remain constant on the duration of one frame.∆f can have a value between0 to 1% of the symbol rate 1/Ts.

At the receiver, the frame is scanned. The packets7a and 8c transmitted by users7 and 8, on time slots 3 and 8 respectively, are decoded successfully because they are clean packets. Then, they are removed from the frame as well as their replicas (7b, 7c) and (8a, 8b). After the interference cancellation, the new frame configuration is shown in Fig.4. All the remaining replicas are in collision. Given that all the packets are equi-powered, this situation is a deadlock for CRDSA++ and IRSA. The decoder proceeds with MARSALA in order to attempt to decode the other packets.

The receiver identifies time slot1 (T S1) as a reference time

slot. In Fig.4,T S1contains two packets(2a) and (3a) relative

to user 2 and user 3, respectively. Their copies are received on the other time slots of the frame as follows:(2b) on T S2,

(2c) on T S4,(3b) on T S5 and(3c) on T S7.

The objective is to localise the replicas of the packets transmitted onT S1over the rest of the frame. The localisation

(6)

entity computes the correlation of the signal received onT S1

(x(t)) with the signal received on the rest of the frame (y(t)). The signalsx(t) and y(t) can be written as

x(t) = s2(t)ej(φ2+2π∆f2t)+ s3(t)ejφ3+2π∆f3t+ n1(t) | {z } w(t) (3) y(t) = s2(t − d2)ej(φ ′ 2+2π∆f2t) + s2(t − d4)ej(φ ′′ 2+2π∆f2t) + s3(t − d5)ej(φ ′ 3+2π∆f3t)+ s 3(t − d7)ej(φ ′′ 3+2π∆f3t)+ s(t) | {z } n(t) (4) where s2 ands3 are the signals corresponding to the packets

sent by user 2 and user 3 respectively. φi, φ′i andφ′′i denote

the phase offsets of the first, second and third replica sent by useri. ∆fi refers to the frequency offset anddi represents the

position, in symbol period, on the ith time slot of the frame.

n1(t) is the additive white gaussian noise on T S1.

First, we focus on the signal sent by user 2. The same evaluation is done for user3. In Eq. (5) and Eq. (6), we express x(t) and y(t) in function of the signal sent by user 2, w(t) andn(t). x(t) = s2(t)ej(φ2+2π∆f2t)+ w(t) (5) y(t) = s2(t−d2)ej(φ ′ 2+2π∆f2t)+s 2(t−d4)ej(φ ′′ 2+2π∆f2t)+n(t) (6) The correlation RY,X between x(t) and y(t) in the time

domain can be written as follows RY,X(τ ) = Z t y(t)x∗(t − τ )dt = Z t s2(t − d2)ej(φ ′ 2+2π∆f2t) s∗ 2(t − τ )e−j(φ 2+2π∆f2(t−τ )) + Z t s2(t − d4)ej(φ ′′ 2+2π∆f2t) s∗ 2(t − τ )e−j(φ 2+2π∆f2(t−τ )) +Rn,s2+ Rn,w+ Rs2,w (7)

With Rn,s2 + Rn,w+ Rs2,w being the sum of the cross

correlations between the uncorrelated terms inx(t) and y(t). For user 2, the peak amplitudes of RY,X(τ ) are obtained for

τ = d2 andτ = d4. The same evaluation is done for user 3.

The correlation amplitudes obtained are illustrated in Fig. 5. The positions of the correlation peaks show that time slots2, 4, 5 and 7 contain replicas of the packets present on T S1.

In order to identify which time slots correspond to the set of replicas sent by the same user, each signal received on a time slot detected by a correlation peak, is correlated with the other time slots detected.

As explained in Section III-B, once the replicas are lo-calised, the receiver estimates the following channel param-eters for user 2: the clock drifts ∆τ2 and ∆τ4 as well as

the phase offsetsφ1,φ2 andφ4 (see Fig.6). Then it performs

parameters correction on the three replicas. Finally, it obtains three coherent signals to be combined and decoded. In the rest of the numerical example, we suppose that the parameters correction is perfect so the combined replicas are coherent in timing and phase.

             

Fig. 6: Reception of packet replicas of user 2 with a timing offsetτ = 0 and a clock drift ∆τi on each time sloti

Let us consider the following scenario for user 2. We suppose that the power of the interference termIi is equal to

the power of the signal sent by user2 (P (Ii) = P (s2)). User 2

uses a Quadrature Phase Shift Keying (QPSK) modulation and a turbocode with a coding rate1/2. The AWGN has the same power spectral density N0 on the entire frame duration. The

Signal to Noise Ratio for user2SN R = P(s2)

N0



is supposed to be equal to 2 dB.

With the numerical assumptions considered, the SNIR for user2 on each localised time slot i, can be written as

SN IR2,i=

1 1 + P (s2)

N0

−1(dB) = −2.12 dB . (8)

Given that user 2 uses a modcod QPSK 1/2, the Packet Error Rate (PER) on each time slot i is equal to 1 when the SN IR is equal to −2.12 dB. After combining the 3 replicas of user2, the equivalent SNIR becomes

SN IReq = N2 bP (s2) P3 i=1iN0+ iP (Ii) , = 3 1 + P (s2) N0 −1 (dB) = 2.64 dB . (9)

The PER obtained with a modcod QPSK 1/2 at 2.64 dB

is lower than10−5. Then, after signal combination, the signal

sent by user 2 can be demodulated and decoded successfully. V. SIMULATIONRESULTS

To evaluate the performance in terms of throughput of MARSALA, we realized simulations and compared the results with the throughput obtained by CRDSA. In our simulations, we supposed that all the packets are transmitted with equal power. The channel SNR is the same for all users. To take the same assumptions as in CRDSA analysis, we considered that the channel estimation and the interference cancellation are ideal. We also assumed that the combined replicas are coherent in timing and phase.

In the simulations, we still considered a frame composed ofNstime slots withNuusers attempting to transmit replicas

(7)

0 0.2 0.4 0.6 0.8 1 1.2 1.4 0 0.5 1 1.5 2 Normalized Throughput (T) Normalized Load (G) -2 dB 0 dB 2 dB 5 dB 10 dB

Fig. 7: T vs G with MARSALA-3 for different values of Es/N0; modcod=QPSK1/2, Ns= 100 slots

within a frame duration. The normalized load (G) is:

G = Nu

Ns

, (10)

and the normalized throughput (T) is given by:

T = G ∗ (1 − P LR(G)) , (11)

where PLR(G) is the probabilty that a packet is not decoded for a given G and a given SNR. To ease the recognition of several MARSALA and CRDSA versions, we denote MARSALA-2 and CRDSA-2 the MARSALA and CRDSA systems where each user transmits 2 replicas of the same packet. The same notation is taken for MARSALA-3 and CRDSA-3.

Fig.7 and Fig.8 give simulation results when the frame size is equal to100 slots. The modcod used is QPSK 1/2. In Fig.7, the normalized throughput curves of MARSALA-3 are presented. For each studied SNR, we vary the normalized load in order to maximize the normalized throughput. We observe that, for a relatively low SNR (0 dB), MARSALA allows us to reach a throughput up to0.7. For a higher SNR, the peak of throughput continues to increase and reaches the highest value of 1.4 at an SNR equal to 10 dB.

In Fig.8, we compare the performance in terms of normal-ized throughput between MARSALA and CRDSA, both with an SNR equal to 2 dB. The chosen SNR is close to the modcod ideal SNR. We can notice that the gain between the two methods is significant. The maximum normalized throughputs of MARSALA-2 and 3 are 0.8 and 1.1, respectively, while the throughput achieved by CRDSA is1.5 times lower.

VI. CONCLUSIONANDFUTUREWORK

In this paper, we have presented MARSALA, as a new decoding technique for CRDSA. MARSALA has proposed a solution to the deadlock problem of CRDSA, by doing simple correlation operations over the received frame, and signal summation over the time slots containing packet replicas. With the simulation assumptions considered, MARSALA has proven to achieve a higher throughput than CRDSA with a modcod QPSK1/2. In future work, we will evaluate the effect of imperfect correction of phase and timing when the replicas

0 0.2 0.4 0.6 0.8 1 1.2 1.4 0 0.5 1 1.5 2 Normalized Throughput (T) Normalized Load (G) CRDSA-2 CRDSA-3 MARSALA-2 MARSALA-3

Fig. 8: T vs G with CRDSA-2,-3 and MARSALA-2,-3; mod-cod=QPSK1/2, Es/N0=2 dB, Ns= 100 slots

of a same user are combined. Later, we will also study the

gain of MARSALA with other modcods like QPSK1/3 and

higher order modulations like 8PSK and 16PSK, as well as power unbalanced packets. Furthermore, We will consider the case where MARSALA is combined to IRSA, and thus makes use of different numbers of packet replicas for each user. Then, the optimal distribution functions for the number of replicas in irregular MARSALA will be designed.

REFERENCES

[1] S. Liew S. Zhang and P. Lam, “Hot Topic: Physical-Layer Network Coding,” Proc. ACM Mobicom’06, pp. 358–365, 2006.

[2] E. Casini, R. D. Gaudenzi, and O. D. R. Herrero, “Contention resolution diversity slotted ALOHA (CRDSA) : An enhanced random access scheme for satellite access packet networks,” IEEE Transactions on

Wireless Communications, 2007.

[3] “DVB Document ETSI A155-1, Digital Video Broadcasting (DVB); Second Generation DVB Interactive Satellite System (RCS2); Part2,” 2011.

[4] L. Choudhury Gagan and S. Rappaport Stephen, “Diversity aloha–a random access scheme for satellite communications,” Communications,

IEEE Transactions on, vol. 31, no. 3, pp. 450–457, Mar 1983. [5] O. del Rio Herrero and R. De Gaudenzi, “A high-performance mac

protocol for consumer broadband satellite systems,” 2009.

[6] G. Liva, “Contention resolution diversity slotted aloha with variable rate burst repetitions,” in Global Telecommunications Conference

(GLOBECOM 2010), 2010 IEEE, Dec 2010, pp. 1–6.

[7] M. Chiani, G. Liva, and E. Paolini, “The marriage between random access and codes on graphs: Coded slotted aloha,” in Satellite

Telecom-munications (ESTEL), 2012 IEEE First AESS European Conference on, Oct 2012, pp. 1–6.

[8] H.-C Bui, J. Lacan, and M.-L. Boucheret, “An enhanced multiple random access scheme for satellite communications,” in Wireless

Telecommunications Symposium (WTS), 2012, April 2012, pp. 1–6. [9] CCSDS, “TM Synchronization and channel coding: Recommended

Standard, CCSDS 131.0-B-2; Blue Book,” 2011.

[10] M. Oerder and H. Meyr, “Digital filter and square timing recovery,”

Communications, IEEE Transactions on, vol. 36, no. 5, pp. 605–612, May 1988.

[11] A. Viterbi, “Nonlinear estimation of psk-modulated carrier phase with application to burst digital transmission,” Information Theory, IEEE

Figure

Fig. 1: System model
Fig. 5: Correlation of the signal received on T S 1 and the rest of the frame
Fig. 6: Reception of packet replicas of user 2 with a timing offset τ = 0 and a clock drift ∆τ i on each time slot i
Fig. 7: T vs G with MARSALA-3 for different values of E s /N 0 ; modcod=QPSK 1/2, N s = 100 slots

Références

Documents relatifs

In this work, we empirically studied the space of optimal solutions for the CC problem. We randomly generated a collection of complete synthetic networks and identified all

In the research on efficiency of non recursive approach we have implemented two versions of algorithm used for combinatorial summation of primes that comply condition that a sum

28 The original version is based on the Dijkstra’s algorithm for the computation of the shortest path between two nodes; however, different algorithms can be used within Yen’s

Better access, better health care Although there have been worries that the use of information and communication technologies in health care will increase health inequalities,

We show a simple and easily implementable solution to the word problem for virtual braid groups.. AMS

2014 We propose and analyse a replica symmetric solution for random link travelling salesman problems1. This gives reasonable analytical estimates for thermodynamic

For the first sub-problem genetic algorithms (GA) are often applied and usually handle binary vectors rep- resenting the solutions of the commitment problem.Then the solutions

This model, called DANCE, analyzes the attributes of the items in your recent history and monitors the relative diversity brought by your consultations over time.. We validated